Top News


Dedication Not to Be Taken Lightly at ISC West 2014

Dedication…I have been pondering this word since non-morning person, me, booked my flight to ISC West 2014 at 5:30am on March 12, 2014! Oh yes, Starbucks will definitely be my friend as I wake up at 2:15am on Wednesday morning to fly from Dallas to Houston and then from Houston to Las Vegas to make my first appointment of the day at 10:00am.

High-Tech Solutions

High-Tech Solutions

Nearly everyone is familiar with the standard manned guard booth in which a person sits and allows drivers in and out of a facility; however, border stations, government buildings, military bases and other locales where there can be a “very unwanted guest” all use much highertech security booths.

Raising Concerns

Raising Concerns

Wireless transmission is usually a topic that raises many concerns in the security world. It seems common knowledge nowadays that a wireless network can be easily hacked, and private information can end up on the Internet or someone’s identity can be stolen.

College Upgrades

College Upgrades

Reflecting the uniqueness and diversity of the local Queens’ community, for more than 50 years, Queensborough Community College has served students from Queens and the entire New York City region as a starting place to pursue their academic and career goals.

Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

On Target: Pinpointing the Perimeter Security Challenges of Today’s Military Bases

One might think that a military base is among the most secure places in the country. Unfortunately, though, the sprawling nature of military bases makes them difficult to secure effectively, which leaves these sites vulnerable to a wide range of threats.

Barix Simple Paging Solution Debuts at ISC West

Out-of-the-box solution integrates fixed and mobile paging over the IP network.

aptiQ Alliance Program Members Highlighting Open Systems at ISC West

Showcasing how to extend aptiQ smart cards and NFC-enabled smart phone credentials to diversity of applications.



Help Children in Need by Participating in Mission 500 Events at ISC West 2014

Industry supports Mission 500 with great line-up of events and programs.

TSA Plans Mandatory Active Shooter Training for Airport Employees

TSA Plans Mandatory Active Shooter Training for Airport Employees

The agency released a 26-page report after an internal review that followed the fatal shooting of an employee in November 2013 at LAX.

Featured

  • Teaching AI New Tricks

    You have probably heard that AI-enabled security cameras are evolving the role of traditional surveillance cameras, shifting the focus from passive monitoring to active problem-solving and operational insights. AI technology changes fast, so what is new can be considered only news in just a few months. Read Now

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.